{"bundle_type":"pith_open_graph_bundle","bundle_version":"1.0","pith_number":"pith:2015:EG5P3IKF53AZWSF6MOGQNX2TYR","short_pith_number":"pith:EG5P3IKF","canonical_record":{"source":{"id":"1511.04897","kind":"arxiv","version":2},"metadata":{"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.CR","submitted_at":"2015-11-16T10:24:33Z","cross_cats_sorted":[],"title_canon_sha256":"f3d18332a2503c99051246f70d49d67f6b546e4a821503720ac2cae0795610bc","abstract_canon_sha256":"5e4c7cd0c24419cc827644bfff6ccd1832d4350cd32e2275bf4491b0664b0277"},"schema_version":"1.0"},"canonical_sha256":"21bafda145eec19b48be638d06df53c479c47f5801983c6422cc76c569f9d27f","source":{"kind":"arxiv","id":"1511.04897","version":2},"source_aliases":[{"alias_kind":"arxiv","alias_value":"1511.04897","created_at":"2026-05-18T01:12:17Z"},{"alias_kind":"arxiv_version","alias_value":"1511.04897v2","created_at":"2026-05-18T01:12:17Z"},{"alias_kind":"doi","alias_value":"10.48550/arxiv.1511.04897","created_at":"2026-05-18T01:12:17Z"},{"alias_kind":"pith_short_12","alias_value":"EG5P3IKF53AZ","created_at":"2026-05-18T12:29:19Z"},{"alias_kind":"pith_short_16","alias_value":"EG5P3IKF53AZWSF6","created_at":"2026-05-18T12:29:19Z"},{"alias_kind":"pith_short_8","alias_value":"EG5P3IKF","created_at":"2026-05-18T12:29:19Z"}],"events":[{"event_type":"record_created","subject_pith_number":"pith:2015:EG5P3IKF53AZWSF6MOGQNX2TYR","target":"record","payload":{"canonical_record":{"source":{"id":"1511.04897","kind":"arxiv","version":2},"metadata":{"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.CR","submitted_at":"2015-11-16T10:24:33Z","cross_cats_sorted":[],"title_canon_sha256":"f3d18332a2503c99051246f70d49d67f6b546e4a821503720ac2cae0795610bc","abstract_canon_sha256":"5e4c7cd0c24419cc827644bfff6ccd1832d4350cd32e2275bf4491b0664b0277"},"schema_version":"1.0"},"canonical_sha256":"21bafda145eec19b48be638d06df53c479c47f5801983c6422cc76c569f9d27f","receipt":{"kind":"pith_receipt","key_id":"pith-v1-2026-05","algorithm":"ed25519","signed_at":"2026-05-18T01:12:17.042290Z","signature_b64":"I44pO9dABIT5bhFM6ioPT2OGhKknac+Fj6oIPhcDjyc72SoVSxssBLjiHJPw8EVsJnjvTDsEZefmfnMGyizuBQ==","signed_message":"canonical_sha256_bytes","builder_version":"pith-number-builder-2026-05-17-v1","receipt_version":"0.3","canonical_sha256":"21bafda145eec19b48be638d06df53c479c47f5801983c6422cc76c569f9d27f","last_reissued_at":"2026-05-18T01:12:17.041943Z","signature_status":"signed_v1","first_computed_at":"2026-05-18T01:12:17.041943Z","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"source_kind":"arxiv","source_id":"1511.04897","source_version":2,"attestation_state":"computed"},"signer":{"signer_id":"pith.science","signer_type":"pith_registry","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"created_at":"2026-05-18T01:12:17Z","supersedes":[],"prev_event":null,"signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"UQyQg1iUdcGfXYxGu5hSceGnMWyHxoE+KcprembEwvFI3U/+D3Ve1N63elaLFFh3F7s/ggpxjszAvumcnSzgAA==","signed_message":"open_graph_event_sha256_bytes","signed_at":"2026-05-20T20:27:22.295939Z"},"content_sha256":"13ab15c8e48c9b36e90eb850499f7746414c827b84f4687dddd7e311d409bd61","schema_version":"1.0","event_id":"sha256:13ab15c8e48c9b36e90eb850499f7746414c827b84f4687dddd7e311d409bd61"},{"event_type":"graph_snapshot","subject_pith_number":"pith:2015:EG5P3IKF53AZWSF6MOGQNX2TYR","target":"graph","payload":{"graph_snapshot":{"paper":{"title":"ARMageddon: Cache Attacks on Mobile Devices","license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","headline":"","cross_cats":[],"primary_cat":"cs.CR","authors_text":"Cl\\'ementine Maurice, Daniel Gruss, Moritz Lipp, Raphael Spreitzer, Stefan Mangard","submitted_at":"2015-11-16T10:24:33Z","abstract_excerpt":"In the last 10 years, cache attacks on Intel x86 CPUs have gained increasing attention among the scientific community and powerful techniques to exploit cache side channels have been developed. However, modern smartphones use one or more multi-core ARM CPUs that have a different cache organization and instruction set than Intel x86 CPUs. So far, no cross-core cache attacks have been demonstrated on non-rooted Android smartphones. In this work, we demonstrate how to solve key challenges to perform the most powerful cross-core cache attacks Prime+Probe, Flush+Reload, Evict+Reload, and Flush+Flus"},"claims":{"count":0,"items":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"source":{"id":"1511.04897","kind":"arxiv","version":2},"verdict":{"id":null,"model_set":{},"created_at":null,"strongest_claim":"","one_line_summary":"","pipeline_version":null,"weakest_assumption":"","pith_extraction_headline":""},"references":{"count":0,"sample":[],"resolved_work":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57","internal_anchors":0},"formal_canon":{"evidence_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"author_claims":{"count":0,"strong_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"builder_version":"pith-number-builder-2026-05-17-v1"},"verdict_id":null},"signer":{"signer_id":"pith.science","signer_type":"pith_registry","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"created_at":"2026-05-18T01:12:17Z","supersedes":[],"prev_event":null,"signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"KdSCl2yGtlJYri47fHDvYg+kp69/paXvC/FHlTWlKHioC7GpctmeVao5NwjckXQZBGyk4AS6vzaKceVqLHT3Cw==","signed_message":"open_graph_event_sha256_bytes","signed_at":"2026-05-20T20:27:22.296287Z"},"content_sha256":"902aae8980c50aaf9df53f84dddc89071ffe7b93bb278604b41487003269b108","schema_version":"1.0","event_id":"sha256:902aae8980c50aaf9df53f84dddc89071ffe7b93bb278604b41487003269b108"}],"timestamp_proofs":[],"mirror_hints":[{"mirror_type":"https","name":"Pith Resolver","base_url":"https://pith.science","bundle_url":"https://pith.science/pith/EG5P3IKF53AZWSF6MOGQNX2TYR/bundle.json","state_url":"https://pith.science/pith/EG5P3IKF53AZWSF6MOGQNX2TYR/state.json","well_known_bundle_url":"https://pith.science/.well-known/pith/EG5P3IKF53AZWSF6MOGQNX2TYR/bundle.json","status":"primary"}],"public_keys":[{"key_id":"pith-v1-2026-05","algorithm":"ed25519","format":"raw","public_key_b64":"stVStoiQhXFxp4s2pdzPNoqVNBMojDU/fJ2db5S3CbM=","public_key_hex":"b2d552b68890857171a78b36a5dccf368a953413288c353f7c9d9d6f94b709b3","fingerprint_sha256_b32_first128bits":"RVFV5Z2OI2J3ZUO7ERDEBCYNKS","fingerprint_sha256_hex":"8d4b5ee74e4693bcd1df2446408b0d54","rotates_at":null,"url":"https://pith.science/pith-signing-key.json","notes":"Pith uses this Ed25519 key to sign canonical record SHA-256 digests. Verify with: ed25519_verify(public_key, message=canonical_sha256_bytes, signature=base64decode(signature_b64))."}],"merge_version":"pith-open-graph-merge-v1","built_at":"2026-05-20T20:27:22Z","links":{"resolver":"https://pith.science/pith/EG5P3IKF53AZWSF6MOGQNX2TYR","bundle":"https://pith.science/pith/EG5P3IKF53AZWSF6MOGQNX2TYR/bundle.json","state":"https://pith.science/pith/EG5P3IKF53AZWSF6MOGQNX2TYR/state.json","well_known_bundle":"https://pith.science/.well-known/pith/EG5P3IKF53AZWSF6MOGQNX2TYR/bundle.json"},"state":{"state_type":"pith_open_graph_state","state_version":"1.0","pith_number":"pith:2015:EG5P3IKF53AZWSF6MOGQNX2TYR","merge_version":"pith-open-graph-merge-v1","event_count":2,"valid_event_count":2,"invalid_event_count":0,"equivocation_count":0,"current":{"canonical_record":{"metadata":{"abstract_canon_sha256":"5e4c7cd0c24419cc827644bfff6ccd1832d4350cd32e2275bf4491b0664b0277","cross_cats_sorted":[],"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.CR","submitted_at":"2015-11-16T10:24:33Z","title_canon_sha256":"f3d18332a2503c99051246f70d49d67f6b546e4a821503720ac2cae0795610bc"},"schema_version":"1.0","source":{"id":"1511.04897","kind":"arxiv","version":2}},"source_aliases":[{"alias_kind":"arxiv","alias_value":"1511.04897","created_at":"2026-05-18T01:12:17Z"},{"alias_kind":"arxiv_version","alias_value":"1511.04897v2","created_at":"2026-05-18T01:12:17Z"},{"alias_kind":"doi","alias_value":"10.48550/arxiv.1511.04897","created_at":"2026-05-18T01:12:17Z"},{"alias_kind":"pith_short_12","alias_value":"EG5P3IKF53AZ","created_at":"2026-05-18T12:29:19Z"},{"alias_kind":"pith_short_16","alias_value":"EG5P3IKF53AZWSF6","created_at":"2026-05-18T12:29:19Z"},{"alias_kind":"pith_short_8","alias_value":"EG5P3IKF","created_at":"2026-05-18T12:29:19Z"}],"graph_snapshots":[{"event_id":"sha256:902aae8980c50aaf9df53f84dddc89071ffe7b93bb278604b41487003269b108","target":"graph","created_at":"2026-05-18T01:12:17Z","signer":{"key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signer_id":"pith.science","signer_type":"pith_registry"},"payload":{"graph_snapshot":{"author_claims":{"count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57","strong_count":0},"builder_version":"pith-number-builder-2026-05-17-v1","claims":{"count":0,"items":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"formal_canon":{"evidence_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"paper":{"abstract_excerpt":"In the last 10 years, cache attacks on Intel x86 CPUs have gained increasing attention among the scientific community and powerful techniques to exploit cache side channels have been developed. However, modern smartphones use one or more multi-core ARM CPUs that have a different cache organization and instruction set than Intel x86 CPUs. So far, no cross-core cache attacks have been demonstrated on non-rooted Android smartphones. In this work, we demonstrate how to solve key challenges to perform the most powerful cross-core cache attacks Prime+Probe, Flush+Reload, Evict+Reload, and Flush+Flus","authors_text":"Cl\\'ementine Maurice, Daniel Gruss, Moritz Lipp, Raphael Spreitzer, Stefan Mangard","cross_cats":[],"headline":"","license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.CR","submitted_at":"2015-11-16T10:24:33Z","title":"ARMageddon: Cache Attacks on Mobile Devices"},"references":{"count":0,"internal_anchors":0,"resolved_work":0,"sample":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"source":{"id":"1511.04897","kind":"arxiv","version":2},"verdict":{"created_at":null,"id":null,"model_set":{},"one_line_summary":"","pipeline_version":null,"pith_extraction_headline":"","strongest_claim":"","weakest_assumption":""}},"verdict_id":null}}],"author_attestations":[],"timestamp_anchors":[],"storage_attestations":[],"citation_signatures":[],"replication_records":[],"corrections":[],"mirror_hints":[],"record_created":{"event_id":"sha256:13ab15c8e48c9b36e90eb850499f7746414c827b84f4687dddd7e311d409bd61","target":"record","created_at":"2026-05-18T01:12:17Z","signer":{"key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signer_id":"pith.science","signer_type":"pith_registry"},"payload":{"attestation_state":"computed","canonical_record":{"metadata":{"abstract_canon_sha256":"5e4c7cd0c24419cc827644bfff6ccd1832d4350cd32e2275bf4491b0664b0277","cross_cats_sorted":[],"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.CR","submitted_at":"2015-11-16T10:24:33Z","title_canon_sha256":"f3d18332a2503c99051246f70d49d67f6b546e4a821503720ac2cae0795610bc"},"schema_version":"1.0","source":{"id":"1511.04897","kind":"arxiv","version":2}},"canonical_sha256":"21bafda145eec19b48be638d06df53c479c47f5801983c6422cc76c569f9d27f","receipt":{"algorithm":"ed25519","builder_version":"pith-number-builder-2026-05-17-v1","canonical_sha256":"21bafda145eec19b48be638d06df53c479c47f5801983c6422cc76c569f9d27f","first_computed_at":"2026-05-18T01:12:17.041943Z","key_id":"pith-v1-2026-05","kind":"pith_receipt","last_reissued_at":"2026-05-18T01:12:17.041943Z","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","receipt_version":"0.3","signature_b64":"I44pO9dABIT5bhFM6ioPT2OGhKknac+Fj6oIPhcDjyc72SoVSxssBLjiHJPw8EVsJnjvTDsEZefmfnMGyizuBQ==","signature_status":"signed_v1","signed_at":"2026-05-18T01:12:17.042290Z","signed_message":"canonical_sha256_bytes"},"source_id":"1511.04897","source_kind":"arxiv","source_version":2}}},"equivocations":[],"invalid_events":[],"applied_event_ids":["sha256:13ab15c8e48c9b36e90eb850499f7746414c827b84f4687dddd7e311d409bd61","sha256:902aae8980c50aaf9df53f84dddc89071ffe7b93bb278604b41487003269b108"],"state_sha256":"5f39f3bdf8f85a3269ebbda100c0e29e1874f5b272b02068aaf958e3a2e0c24e"},"bundle_signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"nejUTwtru4gys54fE4uyFTya0fbAK42lDLuEGyh6P7k8zZ2TjyH5wh56I2x3EFA1MRuwdPJGRAjEvVwcxwxKDQ==","signed_message":"bundle_sha256_bytes","signed_at":"2026-05-20T20:27:22.298308Z","bundle_sha256":"cf6a4a06d095f178c8edd406cadc3eafa0c995f6e5dfe03a56c4e223ad17d641"}}